Race Condition Affecting @web3-react/eip1193 package, versions >=8.0.11-alpha.0 <8.0.27-beta.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-WEB3REACTEIP1193-5430441
  • published 19 Apr 2023
  • disclosed 18 Apr 2023
  • credit Unknown

How to fix?

Upgrade @web3-react/eip1193 to version 8.0.27-beta.0 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition such that chainId may be outdated if the user changes chains as part of the connection flow. This means that the value of chainId returned by useWeb3React() may be incorrect. In an application, this means that any data derived from chainId could be incorrect.

Impact:

If a swapping application derives a wrapped token contract address from the chainId and a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.2 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    High
  • Availability (A)
    Low
Expand this section

NVD

5.7 medium